The industry's initial encryption technology, WEP, was quickly broken by published tools WEPCrack and AirSnort,
which exploit vulnerabilities in the WEP encryption algorithm. Each of these tools passively observe WLAN traffic
until it collects enough data by which it recognizes repetitions and breaks the encryption key. Also, remember
the Kismet wireless sniffer?   It is very good at detecting and sniffing unsecured WLANs...
Wired Equivalent Privacy (WEP)
* NOT recommended due to critical flaws *WEP Defined
Tutorial
WEP Analysis
WEP is weak!
WEP vs. WPA
_______________________________________________________________________________________________
Wi-Fi Protected Access (WPA)
WPA DefinedMore Info
WhitePaper  (April 2003 PDF)
_______________________________________________________________________________________________
Wi-Fi Protected Access with AES (WPA2)
* Recommended to use if all devices support it *Intro of WPA2  (Sept 2004)
WPA2 Defined
Overview
WPA2 Knowledge Center
Tutorial  (Opening ad?)
Explaining WPA2
_______________________________________________________________________________________________
Paint to protect?